CVE-2026-21511
Analyzed Analyzed - Analysis Complete
Deserialization Vulnerability in Microsoft Outlook Enables Network Spoofing

Publication date: 2026-02-10

Last updated on: 2026-02-11

Assigner: Microsoft Corporation

Description
Deserialization of untrusted data in Microsoft Office Outlook allows an unauthorized attacker to perform spoofing over a network.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-10
Last Modified
2026-02-11
Generated
2026-05-07
AI Q&A
2026-02-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 15 associated CPEs
Vendor Product Version / Range
microsoft sharepoint_server 2019
microsoft sharepoint_server 2016
microsoft 365_apps *
microsoft 365_apps *
microsoft office_long_term_servicing_channel 2021
microsoft office 2019
microsoft office 2019
microsoft word 2016
microsoft word 2016
microsoft office_long_term_servicing_channel 2024
microsoft office_long_term_servicing_channel 2021
microsoft office_long_term_servicing_channel 2021
microsoft office_long_term_servicing_channel 2024
microsoft office_long_term_servicing_channel 2024
microsoft sharepoint_server to 16.0.19127.20518 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the deserialization of untrusted data in Microsoft Office Outlook. It allows an unauthorized attacker to perform spoofing over a network.


How can this vulnerability impact me? :

The impact of this vulnerability is spoofing, which means an attacker can impersonate another user or entity over a network. This can lead to deception and potentially unauthorized actions or information disclosure.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart